Preferred Language
Articles
/
joe-396
Desulfurization of AL-Ahdab Crude Oil using Oxidative Processes
...Show More Authors

Two different oxidative desulfurization strategies based on oxidation/adsorption or oxidation/extraction were evaluated for the desulfurization of AL-Ahdab (AHD) sour crude oil (3.9wt% sulfur content). In the oxidation process, a homogenous oxidizing agent comprising of hydrogen peroxide and formic acid was used. Activated carbons were used as sorbent/catalyst in the oxidation/adsorption process while acetonitrile was used as an extraction solvent in the oxidation/extraction process. For the oxidation/adsorption scheme, the experimental results indicated that the oxidation desulfurization efficiency was enhanced on using activated carbon as catalyst/sorbent. The effects of the operating conditions (contact time, temperature, mixing speed and sorbent dose) on the desulfurization efficiency were examined. The desulfurization efficiency measured at the best operating conditions(optimum conditions): 60 , 500rpm, 60min contact time and sorbent dose of 0.7g AC/100 ml AHD crude, was 32.8% corresponding to a sulfur content of 2.6 wt%. Applying the same optimum operating conditions and at 3:1 solvent/oil ratio, the oxidation/extraction method gave comparable desulfurization efficiency of 31.5%.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An efficient method for stamps recognition using Haar wavelet sub-bands
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Control the deposition uniformity using ring cathode by DC discharge technique
...Show More Authors

Simulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Proceedings Of The Aintec 2014 On Asian Internet Engineering Conference - Aintec '14
LTE Peak Data Rate Estimation Using Modified alpha-Shannon Capacity Formula
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Using microalga Coelastrella sp. to remove some nutrients from wastewater invitro
...Show More Authors

Microalgae have been increasingly used for wastewater treatment due to their capacity to assimilate nutrients. Samples of wastewater were taken from the Erbil wastewater channel near Dhahibha village in northern Iraq. The microalga Coelastrella sp. was used in three doses (0.2, 1, and 2g. l-1) in this experiment for 21 days, samples were periodically (every 3 days) analyzed for physicochemical parameters such as pH, EC, Phosphate, Nitrate, and BOD5, in addition to, Chlorophyll a concentration. Results showed that the highest dose 2g.l-1 was the most effective dose for removing nutrients, confirmed by significant differences (p≤0.05) between all doses. The highest removal percentage was

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application
...Show More Authors

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 17 2025
Journal Name
Research In Social Sciences
Using Chatbot and ChatGPT as Useful Tools in Scientific Academic Writing
...Show More Authors

This review investigates the practice and influence of chatbots and ChatGPT as employable tools in writing for scientific academic purposes. A primary collection of 150 articles was gathered from academic databases, but it was systematically chosen and refined to include 30 studies that focused on the use of ChatGPT and chatbot technology in academic writing contexts. Chatbots and ChatGPT in writing enhancement, support for student learning at higher education institutions, scientific and medical writing, and the evolution of research and academic publishing are some of the topics covered in the reviewed literature. The review finds these tools helpful, with their greatest advantages being in areas such as structuring writings, gram

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Direct method for Solving Nonlinear Variational Problems by Using Hermite Wavelets
...Show More Authors

In this work, we first construct Hermite wavelets on the interval [0,1) with it’s product, Operational matrix of integration 2^k M×2^k M is derived, and used it for solving nonlinear Variational problems with reduced it to a system of algebric equations and aid of direct method. Finally, some examples are given to illustrate the efficiency and performance of presented method.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Preparation ultra fine particles from Ceramic refractory material using CO2 Laser
...Show More Authors

S a mples of compact magnesia and alumina were evaporated
using CO2-laser .The
Processed powders were characterized by electron microscopy
and both scanning and transmission electron microscope. The results
indicated that the particle size for both powders have reduced largely
to 0.003 nm and 0.07 nm for MgO and Al2O3, with increasing in
shape sphericity.

View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref